<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>CVE-2004-1653 SSH port forwarding expose unprotected localhost/internal services</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-19-292</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2020-06-26T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2020-06-26T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2020-06-26T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            An improper access control vulnerability in the admin SSH console of multiple products may allow an authenticated user to access internal only system services via using SSH local port forwarding. A successful attack needs an authenticated admin SSH user to set up a port bounce to product internal only services via SSH local port forwarding; potential consequences are information disclosure and/or privilege escalation.
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Information disclosure
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiGate is not impacted.FortiSwitch is not impacted.FortiAnalyzer versions 5.x, 6.2.0 to 6.2.3, 6.0.8 and belowFortiManager versions 5.x, 6.2.0 to 6.2.3, 6.0.8 and belowFortiADC versions 5.3.0 through 5.3.4 and 5.2.0 through 5.2.5.FortiWAN versions 4.5.7 and belowFortiAP-S/W2 versions 6.2.3 and belowFortiAP-U versions 6.0.1 and belowFortiAP-C versions 5.4.2 and belowFortiDDOS versions 5.2.0 and belowFortiExtender version 4.2.0 and belowFortiWLC versions 8.5.1 through 8.5.5FortiPortal versions 5.3.2 and below, 5.2.4 and belowFortiSIEM versions 5.x, 6.1.x, 6.2.x
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            Please upgrade to FortiAnalyzer versions 6.0.9 or 6.2.4 or 6.4.0 or abovePlease upgrade to FortiManager versions 6.0.9 or 6.2.4 or 6.4.0 abovePlease upgrade to FortiADC versions 5.3.5 or 5.2.6 or 5.4.0 or above.Please upgrade to FortiWAN versions 4.5.8 or above.Please upgrade to FortiAP-S/W2 versions 6.2.4 or above.Please upgrade to FortiAP-U versions 6.0.2 or above.Please upgrade to FortiAP-C versions 5.4.3 or above.Please upgrade to FortiDDOS versions 5.2.1 or above.Please upgrade to FortiExtender versions 4.2.1 or above.Please upgrade to FortiWLC versions 8.6.0 or above.Please upgrade to FortiPortal versions 5.2.5 or 5.3.3 or 6.0.0 or above.Please upgrade to FortiSIEM versions 6.3.0 or above.Workarounds:isable admin SSH console, or set trusted hosts to restrict admin SSH console access to trusted users, to prevent scenarios where an attacker who acquired valid user accounts via phishing / social engineering uses those to perform this attack.
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:DocumentReferences>
        <cvrf:Reference>
            <cvrf:URL>https://fortiguard.fortinet.com/psirt/FG-IR-19-292</cvrf:URL>
            <cvrf:Description>CVE-2004-1653 SSH port forwarding expose unprotected localhost/internal services</cvrf:Description>
        </cvrf:Reference>
        <cvrf:Reference>
            <cvrf:URL>OpenSSH CVE-2004-1653</cvrf:URL>
            <cvrf:Description>OpenSSH CVE-2004-1653</cvrf:Description>
        </cvrf:Reference>
    </cvrf:DocumentReferences>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Fortinet is pleased to thank Renee Trisberg from SpectX ( https://www.spectx.com/ ) for reporting this vulnerability under FortiAnalyzer through responsible disclosure.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <Vulnerability Ordinal="1">
        <Title>CVE-2004-1653 SSH port forwarding expose unprotected localhost/internal services</Title>
        <cvrf:CVE>CVE-2004-1653</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>6.4</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L/E:F/RL:X/RC:X</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-19-292</URL>
                <Description>CVE-2004-1653 SSH port forwarding expose unprotected localhost/internal services</Description>
            </Reference>Reference>
            <Reference>
                <URL>OpenSSH CVE-2004-1653</URL>
                <Description>OpenSSH CVE-2004-1653</Description>
            </Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>